A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT W Zhang, Z Bao, V Rijmen, M Liu Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015 | 49 | 2015 |
An Algorithm for Counting the Number of -Periodic Binary Sequences with Fixed -Error Linear Complexity W Pan, Z Bao, D Lin, F Liu Cryptology ePrint Archive, 2016 | | 2016 |
Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers Z Xiang, W Zhang, Z Bao, D Lin Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 340 | 2016 |
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing Z Bao, X Dong, J Guo, Z Li, D Shi, S Sun, X Wang Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021 | 38 | 2021 |
Bitsliced implementations of the PRINCE, LED and RECTANGLE block ciphers on AVR 8-bit microcontrollers Z Bao, P Luo, D Lin Information and Communications Security: 17th International Conference …, 2016 | 18 | 2016 |
Conditional Differential-Neural Cryptanalysis. Z Bao, J Guo, M Liu, L Ma, Y Tu IACR Cryptol. ePrint Arch. 2021, 719, 2021 | 38* | 2021 |
Differential-linear approximation semi-unconstrained searching and partition tree: Application to lea and speck Y Chen, Z Bao, H Yu International Conference on the Theory and Application of Cryptology and …, 2023 | 1 | 2023 |
Evaluating the security of Merkle-Damgård hash functions and combiners in quantum settings Z Bao, J Guo, S Li, P Pham International Conference on Network and System Security, 687-711, 2022 | 4 | 2022 |
Extended Expectation Cryptanalysis on Round-reduced AES. Z Bao, J Guo, E List IACR Cryptol. ePrint Arch. 2019, 622, 2019 | 4 | 2019 |
Extended truncated-differential distinguishers on round-reduced AES Z Bao, J Guo, E List Cryptology ePrint Archive, 2019 | 14 | 2019 |
Functional graph revisited: Updates on (second) preimage attacks on hash combiners Z Bao, L Wang, J Guo, D Gu Annual International Cryptology Conference, 404-427, 2017 | 12 | 2017 |
Functional graphs and their applications in generic attacks on iterated hash constructions Z Bao, J Guo, L Wang Cryptology ePrint Archive, 2018 | 7 | 2018 |
Generic attacks on hash combiners Z Bao, I Dinur, J Guo, G Leurent, L Wang Journal of Cryptology 33 (3), 742-823, 2020 | 10 | 2020 |
Improved meet-in-the-middle preimage attacks against AES hashing modes Z Bao, L Ding, J Guo, H Wang, W Zhang IACR Transactions on Symmetric Cryptology, 318-347, 2019 | 15 | 2019 |
KNOT: algorithm specifications and supporting document W Zhang, T Ding, B Yang, Z Bao, Z Xiang, F Ji, X Zhao Submission to NIST lightweight cryptography project, 2019 | 19 | 2019 |
More insight on deep learning-aided cryptanalysis Z Bao, J Lu, Y Yao, L Zhang International Conference on the Theory and Application of Cryptology and …, 2023 | 5 | 2023 |
Optimizing implementations of linear layers Z Xiang, X Zeng, D Lin, Z Bao, S Zhang IACR Transactions on Symmetric Cryptology, 2020 | 60 | 2020 |
PEIGEN–a platform for evaluation, implementation, and generation of S-boxes Y Sasaki, S Ling, J Guo, Z Bao | 50 | 2019 |
PHOTON-beetle authenticated encryption and hash family Z Bao, A Chakraborti, N Datta, J Guo, M Nandi, T Peyrin, K Yasuda NIST Lightweight Compet. Round 1, 115, 2019 | 64 | 2019 |
Quantum multi-collision distinguishers Z Bao, J Guo, S Li, P Pham Cryptology ePrint Archive, 2021 | 5 | 2021 |